[ISN] Heartbleed to blame for Community Health Systems breach

http://www.csoonline.com/article/2466726/data-protection/heartbleed-to-blame-for-community-health-systems-breach.html By Steve Ragan CSO Aug 19, 2014 According to a blog post from TrustedSec, an information security consultancy in Ohio, the breach at Community Health Systems (CHS) is the result of attackers targeting a flaw OpenSSL, CVE-2014-0160, better known as Heartbleed. The incident marks the first case Heartbleed has been linked to an attack of this size and type. On Monday, CHS disclosed a data breach in an 8-K filing with the U.S. Securities and Exchange Commission. The filing itself was brief, offering few details on the actual attack and its root cause. The regulatory notice stated that CHS believes the network compromise itself happened in April and June of 2014. Once discovered, they hired Mandiant to perform an investigation, which speculated that the attacker was part of a group in China. […]




Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] New hacking scenario emerges: Wi-Fi signal-sniffing drones

http://defensesystems.com/articles/2014/08/15/drones-can-hack-wifi-networks.aspx By George Leopold Defense Systems Aug 15, 2014 The next major network security threat could come from the sky, in the form of drones equipped with video cameras and the ability to sniff out mobile devices and their unique identifiers, perhaps even establishing rogue network access points in the sky that could be used to hack sensitive government or corporate networks. That’s the potential threat, according to security specialists and at least one network security company offering detection equipment to address the new threat from the sky posed by network-hacking drones. The inherent openness of Wi-Fi and other wireless networks, along with the proliferation of mobiles devices constantly seeking network connections, provide a tempting target for signal-sniffing drones. Experts stressed that the security perimeter of an office building will now have to include the airspace around the structure, because that airspace can be easily surveyed by drones at standoff distances capable of relaying video about, say, an agency’s wireless infrastructure. In another scenario, security analyst Glenn Wilkinson described how he rigged a “distributed, tracking, profiling and data-interception framework” called “Snoopy” to a quadcopter drone. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Crooks turn war-torn Syria into cyber-battlefield

http://www.timesofisrael.com/crooks-turn-war-torn-syria-into-cyber-battlefield/ By David Shamah The Times of Israel August 20, 2014 Syrian hackers, known best for their attacks on vital sites in Israel, the US, and Europe, are turning on their own people, taking advantage of their fears about the devastating civil war around them The Syrian Electronic Army, an outfit that has gained fame for its hacks of government and defense websites, is one of the biggest beneficiaries of the unrest that has characterized Syria for the past several years. SEA hackers get access to user systems, recording information about on-line accounts and stealing funds, or using victims’ computers as part of huge botnets that send out spam and become part of attacks on banks and financial sites. A new report by security firm Kaspersky Lab shows how the SEA has used a variety of Internet “dirty tricks” to hoodwink panicked web users into clicking on links and files that have installed a variety of Trojans, viruses, password hijackers, and other malware that give cybercrooks full access to computers. Because Syrians are rattled enough by the civil war to apparently click on anything that seems “official,” issued by the government or the army, hackers don’t even have to bother making their phony wares seem real. They’re confident that users will even gladly click on something called “Ammazon Internet Security” if they believe it will make them a bit safer. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Attend Cyber Security EXPO – October 8-9, 2014

Cyber Security EXPO is a new event for everybody wanting to protect their organisation from the increasing commercial threat of 21st century cyber-attacks. The challenge of securing corporate data and networks to mitigate risk is greater than ever, so Cyber Security EXPO has been designed to include the following themes – Internet & Network Security, Cyber Crime, Log Data & Advanced Analytics, Identity & Access Management, Privacy & Data Protection, Cloud Security & Governance & more. Co-located with IP EXPO Europe, Cyber Security EXPO, 8-9 October 2014 at ExCel London will host 300+ seminars with CPE points available, 250+ exhibitor and presentations from the likes of Sir Tim Berners-Lee, Mikko Hypponen and Bruce Schneier and many more Register FREE here: http://bit.ly/1oMEvRH


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Identifying and mitigating healthcare IT security risks

http://healthitsecurity.com/2014/08/19/identifying-and-mitigating-healthcare-it-security-risks/ By Patrick Ouellette Health IT Security August 19, 2014 Being proactive in healthcare IT security means picking out risks before incidents occur, not after the fact. But the challenge is that potential risks are spread across a variety of areas within a healthcare organization. Blair Smith, Ph.D. Dean, Informatics-Management-Technology (IMT) at American Sentinel University, spoke with HealthITSecurity.com about security considerations for healthcare organizations. Smith was a professional IT consultant for a number of years and for the last 15 years was with the University of Phoenix, including the last five as the Dean of Information Systems prior to joining American Sentinel. With heavy experience in disaster recovery planning and said he always considered security a heavy risk area. What are some major security risks within healthcare at the moment? When I look at IT security for healthcare organizations, it’s not that much different from what many other retail or manufacturing organizations in that it’s a prominent topic. The key is to understand and identify areas of risk and potential exposure, and it’s where the HIPAA rules for risk assessment become very important. BYOD, for example, has its risks and benefits but from an industry perspective, the access to data housed [on the device] would be a concern. Similarly, cloud security opens another external pathway for data to possibly be exposed to a number of different risks such as inappropriate data access and loss. As we use more mobile devices, whether it’s a smart phone or tablet, those types of things really present a wide range of issues for security personnel. And what we’re seeing today is more hackers and outside threats bringing exposure and risks to organizations. For example, there’s the subject of single sign on (SSO) and how to have effective security controls while maintaining convenience. The idea is to move beyond prevention security to proactive response technology. How do we quickly mitigate and take care of any exposures. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail